SEARCH RESULTS

YOU WERE LOOKING FOR :Business and Data Mining

Essays 1261 - 1290

A Historical World View of Female Genital Mutilation

an exclusively Islamic practice. FGM is a cross-cultural and cross-religious ritual and is in most cultures primarily a social pra...

Organizations, Technology, and 'Cyberliability'

In eight pages legislation and cases involving 'cyberliability' issues are discussed and include Internt transmittal of obscene or...

Citibank Asia Pacific Information Systems and 'Let a Hundred Flowers Bloom'

In ten pages this paper uses case study data regarding Citibank's Asia Pacific information systems and applies the cultural saying...

Accounting Issues and Software Development

In five pages this paper examines the internal uses of software from an accounting perspective with a fictitious company feature...

MSD Ltd. and Software Team Development Management

the effective use of IT." It is evident from the above that the first four points directly link to improving communication...

Case Study Faculty-Student Manuscript

In this scenario, a faculty researcher has two research assistants to help with the project. It is labor-intensive with the assist...

Students Are Note Learning Languages

In today's global world, it is necessary for businesspersons and others to be proficient in at least one other language, yet, enro...

Shell Companies

With the release of the Panama papers, attention has been focused on overseas transactions and shell companies. This paper reports...

A Deadly Epidemic That Lasted Centuries

There are dozens of infectious diseases that have taken the lives of millions and millions of people. Some data back to many centu...

Hackers Against Retail Stores

This essay focuses on the hackers that were able to access credit card data and information from Target's network. The paper repor...

Telecom Company Offers New Product

It has become essential for organizations to have a place to store and backup their data, which is increasing exponentially. Compa...

Title IX Violations Colleges

Sexual harassment is covered under Title IX of the Educational Amendments of 1972. The EEOC defines this as unwelcome sexual advan...

Case STudy Hospital Readmissions

Hospital readmissions of patients is upsetting to patients and families, especially when that readmission occurs within 30 days of...

Legalizing Marijuana Compared to the Prohibition

Special interest groups and propaganda played a strong role in Prohibition and they have played a strong role in drug laws today, ...

EMAIL MARKETING TESTS -- A PROCESS

Analyzes the results of an email campaign, and suggests methods to interpret data. There are 3 sources in the bibliography of this...

Corrupt Officials in the World

The UN reported there was an inverted U-relationship between democracy and corruption in public officials. Numerous reports do not...

Issues with RHIOs

A RHIO is a type of health information exchange organization where certain professionals upload health/medical data and other prof...

STDs Increasing

The introduction reports data about the incidence of Chlamydia and uses that as a catalyst to discuss health programs in schools; ...

Difficulty Proving Employee is Stealing

Unless an employee does something outlandish, it is very difficult to prove he or she is stealing from the company. In this essay,...

Is the Teach-Back Model Effective

This essay follows a different format that usual. Questions are placed in a table with the answers following the question. Color c...

Hospital Upgrades IT Again

Memorial Hermann is a hospital system in Houston. This institution has been on the cutting edge of technology for years. They have...

Determining Statistical Tests

Different types of tests may be used for differing purposes and with different types of data. This paper looks at how univariate ...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

Teenage Substance Abuse Treatment

Most programs intended to stop teenagers from using and abusing substances fail because the teenager does not want to be there and...

Computer Vulnerabilities in the Energy Industry

Cyber security is an important issue within the energy sector. The Stuxnet targeting of Iranian nuclear facilities demonstrated th...

Hungry Children in America

This essay reports statistical data regarding families living below the poverty line and the numbers of children who are food inse...

Disparities in Health Care Access

Not every American has the same opportunity to access and receive quality health care services. There are a number of social, econ...

Three Disasters at a Time

In March, 2011, Japan suffered a massive earthquake, a massive tsunami, and a nuclear accident. No country has ever experienced su...

Statistical Tests

The paper starts by looking at how statistical testing may be used to determine of there is a difference in behavior of three diff...

Efficacy of Bar Code Medication Administration

This research paper offers a literature review of studies that pertain to bar code medication administration (BCMA) systems. The p...